summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/meta/WebCryptoAPI
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/meta/WebCryptoAPI')
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.worker.js.ini4867
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.worker.js.ini30490
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_hkdf.html.ini4862
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_pbkdf2.html.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker.js.ini38
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker.js.ini110
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html.ini38
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html.ini110
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures.html.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini2216
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini2216
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini2216
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini1442
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini1262
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini1208
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini1358
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini3772
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini1502
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini1541
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes.html.ini3
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini6
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini1907
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini57
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini78
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini32
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.worker.js.ini92
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/import_export/test_ec_importKey.html.ini92
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.worker.js.ini506
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/sign_verify/test_ecdsa.html.ini389
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.html.ini173
-rw-r--r--testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.worker.js.ini173
57 files changed, 0 insertions, 62840 deletions
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker.js.ini
deleted file mode 100644
index 2eaf85c94..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[ecdh_bits.worker]
- type: testharness
- expected: TIMEOUT
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker.js.ini
deleted file mode 100644
index e762ce09a..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[ecdh_keys.worker]
- type: testharness
- expected: TIMEOUT
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.worker.js.ini
deleted file mode 100644
index dbd347aaa..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/hkdf.worker.js.ini
+++ /dev/null
@@ -1,4867 +0,0 @@
-[hkdf.worker]
- type: testharness
- disabled:
- if debug and (os == "linux") and (bits == 32): https://bugzilla.mozilla.org/show_bug.cgi?id=1312938
- expected:
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- [short derivedKey, normal salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.worker.js.ini
deleted file mode 100644
index 779a4e1d2..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/pbkdf2.worker.js.ini
+++ /dev/null
@@ -1,30490 +0,0 @@
-[pbkdf2.worker]
- type: testharness
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1309307
- expected: TIMEOUT
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1 iterations with null length]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1 iterations with 0 length]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1000 iterations with null length]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1000 iterations with 0 length]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: FAIL
-
- [short password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-384, with 100000 iterations with null length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-384, with 100000 iterations with 0 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-384, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-512, with 1 iterations with null length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1 iterations with 0 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-512, with 1000 iterations with null length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1000 iterations with 0 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-512, with 100000 iterations with null length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 100000 iterations with 0 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-512, with 0 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-1, with 1 iterations with null length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1 iterations with 0 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-1, with 1000 iterations with null length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1000 iterations with 0 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [short password, short salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): NOTRUN
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected:
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected:
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): PASS
- NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected:
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): PASS
- NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected:
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, short salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [short password, short salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [short password, short salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [short password, short salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [short password, short salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [short password, long salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [short password, long salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [short password, long salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [short password, empty salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [short password, empty salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [short password, empty salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [long password, short salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [long password, short salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [long password, short salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [long password, long salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [long password, long salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [long password, long salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [long password, empty salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [long password, empty salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [long password, empty salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [empty password, short salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [empty password, short salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [empty password, short salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, short salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [empty password, long salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [empty password, long salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [empty password, long salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, long salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 100000 iterations with bad hash name SHA384]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-384, with 0 iterations]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 100000 iterations with bad hash name SHA512]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-512, with 0 iterations]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 100000 iterations with bad hash name SHA1]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-1, with 0 iterations]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 1000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with missing deriveKey usage]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 100000 iterations with null length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 100000 iterations with 0 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 100000 iterations with non-multiple of 8 length]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 100000 iterations with bad hash name SHA256]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 100000 iterations with missing deriveBits usage]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 100000 iterations with wrong (ECDH) key]
- expected: NOTRUN
-
- [empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, SHA-256, with 0 iterations]
- expected: NOTRUN
-
- [empty password, empty salt, PBKDF2, with 1 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, PBKDF2, with 1 iterations]
- expected: NOTRUN
-
- [empty password, empty salt, PBKDF2, with 1000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, PBKDF2, with 1000 iterations]
- expected: NOTRUN
-
- [empty password, empty salt, PBKDF2, with 100000 iterations with non-digest algorithm PBKDF2]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CBC length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-CTR length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-GCM length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 128 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 192 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: AES-KW length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty password, empty salt, PBKDF2, with 100000 iterations]
- expected: NOTRUN
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html.ini
deleted file mode 100644
index 28df3c421..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[test_ecdh_bits.html]
- type: testharness
- expected: TIMEOUT
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html.ini
deleted file mode 100644
index 2edfc5ccd..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[test_ecdh_keys.html]
- type: testharness
- expected: TIMEOUT
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_hkdf.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_hkdf.html.ini
deleted file mode 100644
index d3ed7db1a..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_hkdf.html.ini
+++ /dev/null
@@ -1,4862 +0,0 @@
-[test_hkdf.html]
- type: testharness
- [short derivedKey, normal salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with missing salt]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with missing info]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with null length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info]
- expected: FAIL
-
- [empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with 0 length]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256]
- expected: FAIL
-
- [empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage]
- expected: FAIL
-
- [empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info]
- expected: FAIL
-
- [empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
- [Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_pbkdf2.html.ini b/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_pbkdf2.html.ini
deleted file mode 100644
index cfcbd197f..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/derive_bits_keys/test_pbkdf2.html.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[test_pbkdf2.html]
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1309307
- type: testharness
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker.js.ini
deleted file mode 100644
index 2c9804d86..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_cbc.worker.js.ini
+++ /dev/null
@@ -1,38 +0,0 @@
-[aes_cbc.worker]
- type: testharness
- [AES-CBC 128-bit key, 64-bit IV]
- expected: FAIL
-
- [AES-CBC 128-bit key, 192-bit IV]
- expected: FAIL
-
- [AES-CBC 192-bit key, 64-bit IV]
- expected: FAIL
-
- [AES-CBC 192-bit key, 192-bit IV]
- expected: FAIL
-
- [AES-CBC 256-bit key, 64-bit IV]
- expected: FAIL
-
- [AES-CBC 256-bit key, 192-bit IV]
- expected: FAIL
-
- [AES-CBC 128-bit key, 64-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 128-bit key, 192-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 192-bit key, 64-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 192-bit key, 192-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 256-bit key, 64-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 256-bit key, 192-bit IV decryption]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker.js.ini
deleted file mode 100644
index 3daccbeb1..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/aes_gcm.worker.js.ini
+++ /dev/null
@@ -1,110 +0,0 @@
-[aes_gcm.worker]
- type: testharness
- [AES-GCM 128-bit key, illegal tag length 24-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 48-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 72-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 95-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 129-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 256-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 24-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 48-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 72-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 95-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 129-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 256-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 24-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 48-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 72-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 95-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 129-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 256-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 24-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 48-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 72-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 95-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 129-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 256-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 24-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 48-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 72-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 95-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 129-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 256-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 24-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 48-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 72-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 95-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 129-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 256-bits decryption]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html.ini
deleted file mode 100644
index 1e95676ec..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_cbc.html.ini
+++ /dev/null
@@ -1,38 +0,0 @@
-[test_aes_cbc.html]
- type: testharness
- [AES-CBC 128-bit key, 64-bit IV]
- expected: FAIL
-
- [AES-CBC 128-bit key, 192-bit IV]
- expected: FAIL
-
- [AES-CBC 192-bit key, 64-bit IV]
- expected: FAIL
-
- [AES-CBC 192-bit key, 192-bit IV]
- expected: FAIL
-
- [AES-CBC 256-bit key, 64-bit IV]
- expected: FAIL
-
- [AES-CBC 256-bit key, 192-bit IV]
- expected: FAIL
-
- [AES-CBC 128-bit key, 64-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 128-bit key, 192-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 192-bit key, 64-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 192-bit key, 192-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 256-bit key, 64-bit IV decryption]
- expected: FAIL
-
- [AES-CBC 256-bit key, 192-bit IV decryption]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html.ini b/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html.ini
deleted file mode 100644
index 1e7752bc3..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/encrypt_decrypt/test_aes_gcm.html.ini
+++ /dev/null
@@ -1,110 +0,0 @@
-[test_aes_gcm.html]
- type: testharness
- [AES-GCM 128-bit key, illegal tag length 24-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 48-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 72-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 95-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 129-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 256-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 24-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 48-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 72-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 95-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 129-bits]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 256-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 24-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 48-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 72-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 95-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 129-bits]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 256-bits]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 24-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 48-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 72-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 95-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 129-bits decryption]
- expected: FAIL
-
- [AES-GCM 128-bit key, illegal tag length 256-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 24-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 48-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 72-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 95-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 129-bits decryption]
- expected: FAIL
-
- [AES-GCM 192-bit key, illegal tag length 256-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 24-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 48-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 72-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 95-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 129-bits decryption]
- expected: FAIL
-
- [AES-GCM 256-bit key, illegal tag length 256-bits decryption]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures.worker.js.ini
deleted file mode 100644
index 1e4aabbea..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini
deleted file mode 100644
index 7b3310b78..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CBC.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_AES-CBC.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini
deleted file mode 100644
index 472b09dd1..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-CTR.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_AES-CTR.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini
deleted file mode 100644
index 64e9f58f0..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-GCM.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_AES-GCM.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini
deleted file mode 100644
index 96031ce55..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_AES-KW.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_AES-KW.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini
deleted file mode 100644
index 49ab62829..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDH.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_ECDH.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini
deleted file mode 100644
index 2fd250f45..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_ECDSA.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_ECDSA.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini
deleted file mode 100644
index 411ecbdda..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_HMAC.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_HMAC.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini
deleted file mode 100644
index 3ec9c3c53..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-OAEP.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_RSA-OAEP.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini
deleted file mode 100644
index 7b28b2c04..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSA-PSS.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_RSA-PSS.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini
deleted file mode 100644
index 5cb45ae09..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/failures_RSASSA-PKCS1-v1_5.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[failures_RSASSA-PKCS1-v1_5.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes.worker.js.ini
deleted file mode 100644
index f3a7d610c..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini
deleted file mode 100644
index e9a9e303a..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CBC.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_AES-CBC.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini
deleted file mode 100644
index dcf7febaf..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-CTR.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_AES-CTR.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini
deleted file mode 100644
index 4b949a1b4..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-GCM.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_AES-GCM.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini
deleted file mode 100644
index 5efa92cfc..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_AES-KW.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_AES-KW.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini
deleted file mode 100644
index 42eac719d..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDH.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_ECDH.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini
deleted file mode 100644
index 0d73e197c..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_ECDSA.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_ECDSA.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini
deleted file mode 100644
index 84b2544fd..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_HMAC.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_HMAC.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini
deleted file mode 100644
index f4e683fa2..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-OAEP.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_RSA-OAEP.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini
deleted file mode 100644
index 76a093185..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSA-PSS.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_RSA-PSS.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini
deleted file mode 100644
index 95acb89f6..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/successes_RSASSA-PKCS1-v1_5.worker.js.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[successes_RSASSA-PKCS1-v1_5.worker]
- type: testharness
- expected: ERROR
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures.html.ini
deleted file mode 100644
index 7cde862f5..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures.html.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[test_failures.html]
- type: testharness
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini
deleted file mode 100644
index d5c9d05cc..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CBC.html.ini
+++ /dev/null
@@ -1,2216 +0,0 @@
-[test_failures_AES-CBC.html]
- type: testharness
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CBC}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-CBC}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-CBC}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-CBC}, true, [\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini
deleted file mode 100644
index 666a24aef..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-CTR.html.ini
+++ /dev/null
@@ -1,2216 +0,0 @@
-[test_failures_AES-CTR.html]
- type: testharness
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-CTR}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-CTR}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-CTR}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-CTR}, true, [\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini
deleted file mode 100644
index 36b0ac761..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-GCM.html.ini
+++ /dev/null
@@ -1,2216 +0,0 @@
-[test_failures_AES-GCM.html]
- type: testharness
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, encrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, decrypt, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, false, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-GCM}, true, [encrypt, decrypt, wrapKey, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-GCM}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-GCM}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-GCM}, true, [\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini
deleted file mode 100644
index ac790b068..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_AES-KW.html.ini
+++ /dev/null
@@ -1,1442 +0,0 @@
-[test_failures_AES-KW.html]
- type: testharness
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 128, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 192, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({length: 256, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 64, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 127, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 129, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 255, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 257, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey, wrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, false, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Bad algorithm property: generateKey({length: 512, name: AES-KW}, true, [wrapKey, unwrapKey, wrapKey, unwrapKey\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 128, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 192, name: AES-KW}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-KW}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({length: 256, name: AES-KW}, true, [\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini
deleted file mode 100644
index 08824a106..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDH.html.ini
+++ /dev/null
@@ -1,1262 +0,0 @@
-[test_failures_ECDH.html]
- type: testharness
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveBits, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-256}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveBits, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-384}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveBits, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDH, namedCurve: P-521}, true, [deriveKey, deriveBits, deriveKey, deriveBits, deriveKey, deriveBits, unwrapKey\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDH, namedCurve: P-256}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDH, namedCurve: P-256}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDH, namedCurve: P-384}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDH, namedCurve: P-384}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDH, namedCurve: P-521}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDH, namedCurve: P-521}, true, [\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini
deleted file mode 100644
index 18a00325c..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_ECDSA.html.ini
+++ /dev/null
@@ -1,1208 +0,0 @@
-[test_failures_ECDSA.html]
- type: testharness
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [sign, verify, sign, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [sign, verify, sign, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [sign, verify, sign, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDSA, namedCurve: P-256}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDSA, namedCurve: P-384}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({name: ECDSA, namedCurve: P-521}, true, [\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini
deleted file mode 100644
index b23ce7dae..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_HMAC.html.ini
+++ /dev/null
@@ -1,1358 +0,0 @@
-[test_failures_HMAC.html]
- type: testharness
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [sign, verify, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-1, length: 160, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-256, length: 256, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-384, length: 384, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Empty usages: generateKey({hash: SHA-512, length: 512, name: HMAC}, true, [\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini
deleted file mode 100644
index 3232aff05..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-OAEP.html.ini
+++ /dev/null
@@ -1,3772 +0,0 @@
-[test_failures_RSA-OAEP.html]
- type: testharness
- expected: TIMEOUT
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, sign\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, verify\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey, deriveBits\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey, wrapKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey, wrapKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, encrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [wrapKey, decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [wrapKey, decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey, decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey, decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, decrypt\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey, wrapKey\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey, wrapKey\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [unwrapKey\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [unwrapKey\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: TIMEOUT
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini
deleted file mode 100644
index 8ac457d9f..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSA-PSS.html.ini
+++ /dev/null
@@ -1,1502 +0,0 @@
-[test_failures_RSA-PSS.html]
- type: testharness
- expected: TIMEOUT
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [verify, sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [verify, sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: TIMEOUT
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini
deleted file mode 100644
index 50383a18e..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_failures_RSASSA-PKCS1-v1_5.html.ini
+++ /dev/null
@@ -1,1541 +0,0 @@
-[test_failures_RSASSA-PKCS1-v1_5.html]
- type: testharness
- expected: TIMEOUT
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
- [Bad algorithm: generateKey(AES, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey(AES, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({length: 128, name: AES-CFB}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: MD5, name: HMAC}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({hash: SHA, modulusLength: 2048, name: RSA-PSS, publicExponent: {0: 1, 1: 0, 2: 1}}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, decrypt\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits, sign\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, false, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, true, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, RED, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad algorithm: generateKey({name: EC, namedCurve: P521}, 7, [decrypt, sign, deriveBits, decrypt, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, encrypt\])]
- expected: FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, encrypt\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, decrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, decrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, decrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign, deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify, deriveBits\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [verify, sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [verify, sign\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, false, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1}}, true, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): FAIL
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): FAIL
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): FAIL
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): FAIL
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): FAIL
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [verify, sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [verify, sign\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, false, [sign, verify, sign, sign, verify\])]
- expected: TIMEOUT
-
- [Bad algorithm property: generateKey({hash: SHA-256, modulusLength: 1024, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 0}}, true, [sign, verify, sign, sign, verify\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-1, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [\])]
- expected: TIMEOUT
-
- [Empty usages: generateKey({hash: SHA-256, modulusLength: 2048, name: RSASSA-PKCS1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [\])]
- expected: TIMEOUT
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes.html.ini
deleted file mode 100644
index c18e5a917..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes.html.ini
+++ /dev/null
@@ -1,3 +0,0 @@
-[test_successes.html]
- type: testharness
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini
deleted file mode 100644
index eade3f178..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_AES-CBC.html.ini
+++ /dev/null
@@ -1,6 +0,0 @@
-[test_successes_AES-CBC.html]
- type: testharness
- expected:
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini
deleted file mode 100644
index 0760c5c25..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-OAEP.html.ini
+++ /dev/null
@@ -1,1907 +0,0 @@
-[test_successes_RSA-OAEP.html]
- type: testharness
- expected: TIMEOUT
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: RSA-OAEP, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])]
- expected:
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt, encrypt\])]
- expected:
- if not debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "win") and (version == "6.1.7601") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if debug and e10s and (os == "win") and (version == "5.1.2600") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt, encrypt\])]
- expected:
- if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, encrypt\])]
- expected:
- if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, encrypt\])]
- expected:
- if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, encrypt\])]
- expected:
- if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [decrypt\])]
- expected:
- if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [decrypt\])]
- expected:
- if debug and not e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [wrapKey, decrypt\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [wrapKey, decrypt\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey, decrypt\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, decrypt\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, decrypt\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey, wrapKey\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey, wrapKey\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [unwrapKey\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [unwrapKey\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected:
- if debug and e10s and (os == "win") and (version == "6.2.9200") and (processor == "x86_64") and (bits == 64): PASS
- TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-oaep, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [encrypt, decrypt, wrapKey, unwrapKey, decrypt, unwrapKey, encrypt, decrypt, wrapKey, unwrapKey\])]
- expected: TIMEOUT
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini
deleted file mode 100644
index 3bfe95b8c..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSA-PSS.html.ini
+++ /dev/null
@@ -1,57 +0,0 @@
-[test_successes_RSA-PSS.html]
- type: testharness
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if debug and not e10s and (os == "mac") and (version == "OS X 10.10.5") and (processor == "x86_64") and (bits == 64): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsa-pss, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini b/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini
deleted file mode 100644
index f2c0fdb17..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/generateKey/test_successes_RSASSA-PKCS1-v1_5.html.ini
+++ /dev/null
@@ -1,78 +0,0 @@
-[test_successes_RSASSA-PKCS1-v1_5.html]
- type: testharness
- disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1279799
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-1, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [verify, sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, false, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: Rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [sign, verify, sign, sign, verify\])]
- expected:
- if not debug and not e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
- [Success: generateKey({hash: SHA-256, modulusLength: 2048, name: rsassa-pkcs1-v1_5, publicExponent: {0: 1, 1: 0, 2: 1}}, true, [verify, sign\])]
- expected:
- if not debug and e10s and (os == "linux") and (version == "Ubuntu 12.04") and (processor == "x86") and (bits == 32): TIMEOUT
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini
deleted file mode 100644
index 43fd9d114..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/idlharness.worker.js.ini
+++ /dev/null
@@ -1,32 +0,0 @@
-[idlharness.worker]
- type: testharness
- [CryptoKey interface: existence and properties of interface object]
- expected: FAIL
-
- [CryptoKey interface object length]
- expected: FAIL
-
- [CryptoKey interface object name]
- expected: FAIL
-
- [CryptoKey interface: existence and properties of interface prototype object]
- expected: FAIL
-
- [CryptoKey interface: existence and properties of interface prototype object's "constructor" property]
- expected: FAIL
-
- [CryptoKey interface: attribute type]
- expected: FAIL
-
- [CryptoKey interface: attribute extractable]
- expected: FAIL
-
- [CryptoKey interface: attribute algorithm]
- expected: FAIL
-
- [CryptoKey interface: attribute usages]
- expected: FAIL
-
- [ArrayBuffer interface: existence and properties of interface object]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.worker.js.ini
deleted file mode 100644
index b959d7400..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/import_export/ec_importKey.worker.js.ini
+++ /dev/null
@@ -1,92 +0,0 @@
-[ec_importKey.worker]
- type: testharness
- [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/import_export/test_ec_importKey.html.ini b/testing/web-platform/meta/WebCryptoAPI/import_export/test_ec_importKey.html.ini
deleted file mode 100644
index 6217e5a57..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/import_export/test_ec_importKey.html.ini
+++ /dev/null
@@ -1,92 +0,0 @@
-[test_ec_importKey.html]
- type: testharness
- [Good parameters: P-256 bits (spki, buffer(91), {name: ECDSA, namedCurve: P-256}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, true, [sign\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDSA, namedCurve: P-256}, false, [sign\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (spki, buffer(120), {name: ECDSA, namedCurve: P-384}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, true, [sign\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDSA, namedCurve: P-384}, false, [sign\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (spki, buffer(158), {name: ECDSA, namedCurve: P-521}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, true, [sign\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDSA, namedCurve: P-521}, false, [sign\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (spki, buffer(91), {name: ECDH, namedCurve: P-256}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, true, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-256 bits (pkcs8, buffer(138), {name: ECDH, namedCurve: P-256}, false, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (spki, buffer(120), {name: ECDH, namedCurve: P-384}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, true, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-384 bits (pkcs8, buffer(185), {name: ECDH, namedCurve: P-384}, false, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (spki, buffer(158), {name: ECDH, namedCurve: P-521}, true, [\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, true, [deriveBits\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits, deriveKey\])]
- expected: FAIL
-
- [Good parameters: P-521 bits (pkcs8, buffer(241), {name: ECDH, namedCurve: P-521}, false, [deriveBits\])]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.worker.js.ini
deleted file mode 100644
index 895c0cfea..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/sign_verify/ecdsa.worker.js.ini
+++ /dev/null
@@ -1,506 +0,0 @@
-[ecdsa.worker]
- type: testharness
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered plaintext]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 signing with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verifying with wrong algorithm name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verifying with wrong algorithm name]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/sign_verify/test_ecdsa.html.ini b/testing/web-platform/meta/WebCryptoAPI/sign_verify/test_ecdsa.html.ini
deleted file mode 100644
index 5d8f42f69..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/sign_verify/test_ecdsa.html.ini
+++ /dev/null
@@ -1,389 +0,0 @@
-[test_ecdsa.html]
- type: testharness
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification with altered signature after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 with altered plaintext after call]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 using privateKey to verify]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 using publicKey to sign]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 no verify usage]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 round trip]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to altered signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to wrong hash]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-256 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-384 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-512 verification failure due to bad hash name]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-1 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-256 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-384 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-256 with SHA-512 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-1 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-256 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-384 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-384 with SHA-512 verification failure due to shortened signature]
- expected: FAIL
-
- [importVectorKeys step: ECDSA P-521 with SHA-1 verification failure due to shortened signature]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.html.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.html.ini
deleted file mode 100644
index 5ed9cf5e6..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/test_wrapKey_unwrapKey.html.ini
+++ /dev/null
@@ -1,173 +0,0 @@
-[test_wrapKey_unwrapKey.html]
- type: testharness
- [Can wrap and unwrap AES-KW keys using raw and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-CTR keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-CBC keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-GCM keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap HMAC keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC]
- expected: FAIL
-
diff --git a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.worker.js.ini b/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.worker.js.ini
deleted file mode 100644
index d036154fb..000000000
--- a/testing/web-platform/meta/WebCryptoAPI/wrapKey_unwrapKey/wrapKey_unwrapKey.worker.js.ini
+++ /dev/null
@@ -1,173 +0,0 @@
-[wrapKey_unwrapKey.worker]
- type: testharness
- [Can wrap and unwrap AES-KW keys using raw and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-CTR]
- expected: FAIL
-
- [Can wrap and unwrap RSASSA-PKCS1-v1_5 private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap RSA-OAEP private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-CTR keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-CBC keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-GCM keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap HMAC keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap RSA-PSS private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-KW]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-GCM]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and AES-CBC]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using raw and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap AES-KW keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using spki and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA public key keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using pkcs8 and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDSA private key keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using spki and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH public key keys using jwk and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using pkcs8 and RSA-OAEP]
- expected: FAIL
-
- [Can wrap and unwrap ECDH private key keys using jwk and RSA-OAEP]
- expected: FAIL
-